WO2016036752A3 - Systèmes et procédés permettant de créer et de modifier des listes de contrôle d'accès - Google Patents

Systèmes et procédés permettant de créer et de modifier des listes de contrôle d'accès Download PDF

Info

Publication number
WO2016036752A3
WO2016036752A3 PCT/US2015/047964 US2015047964W WO2016036752A3 WO 2016036752 A3 WO2016036752 A3 WO 2016036752A3 US 2015047964 W US2015047964 W US 2015047964W WO 2016036752 A3 WO2016036752 A3 WO 2016036752A3
Authority
WO
WIPO (PCT)
Prior art keywords
creating
systems
methods
access control
control lists
Prior art date
Application number
PCT/US2015/047964
Other languages
English (en)
Other versions
WO2016036752A2 (fr
Inventor
Malcolm Rieke
James Sebastian DENNIS
Original Assignee
Catbird Networks, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/821,103 external-priority patent/US9769174B2/en
Application filed by Catbird Networks, Inc. filed Critical Catbird Networks, Inc.
Priority to EP15838627.6A priority Critical patent/EP3238407A4/fr
Priority to RU2017127710A priority patent/RU2679179C1/ru
Publication of WO2016036752A2 publication Critical patent/WO2016036752A2/fr
Publication of WO2016036752A3 publication Critical patent/WO2016036752A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5058Service discovery by the service manager
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/04Processing captured monitoring data, e.g. for logfile generation
    • H04L43/045Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5009Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/06Generation of reports

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Human Computer Interaction (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Selon des modes de réalisation, la présente invention peut présenter des informations sur des services hébergés et utilisés par différents actifs sur un réseau, et permettre à des utilisateurs de contrôler l'accès à ces services. En particulier, des modes de réalisation de l'invention peuvent être utilisés pour présenter un ou plusieurs services hébergés par un actif en réseau, et pour commander l'accès à ces services par d'autres actifs en réseau sur la base de l'entrée de l'utilisateur.
PCT/US2015/047964 2014-09-05 2015-09-01 Systèmes et procédés permettant de créer et de modifier des listes de contrôle d'accès WO2016036752A2 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP15838627.6A EP3238407A4 (fr) 2014-09-05 2015-09-01 Systèmes et procédés permettant de créer et de modifier des listes de contrôle d'accès
RU2017127710A RU2679179C1 (ru) 2014-09-05 2015-09-01 Системы и способы для создания и модификации списков управления доступом

Applications Claiming Priority (10)

Application Number Priority Date Filing Date Title
US201462046807P 2014-09-05 2014-09-05
US62/046,807 2014-09-05
US201462060433P 2014-10-06 2014-10-06
US62/060,433 2014-10-06
US201562103496P 2015-01-14 2015-01-14
US62/103,496 2015-01-14
US201562137590P 2015-03-24 2015-03-24
US62/137,590 2015-03-24
US14/821,103 2015-08-07
US14/821,103 US9769174B2 (en) 2013-06-14 2015-08-07 Systems and methods for creating and modifying access control lists

Publications (2)

Publication Number Publication Date
WO2016036752A2 WO2016036752A2 (fr) 2016-03-10
WO2016036752A3 true WO2016036752A3 (fr) 2017-05-04

Family

ID=55440482

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/047964 WO2016036752A2 (fr) 2014-09-05 2015-09-01 Systèmes et procédés permettant de créer et de modifier des listes de contrôle d'accès

Country Status (4)

Country Link
US (1) US10728251B2 (fr)
EP (1) EP3238407A4 (fr)
RU (1) RU2679179C1 (fr)
WO (1) WO2016036752A2 (fr)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9088541B2 (en) 2013-05-31 2015-07-21 Catbird Networks, Inc. Systems and methods for dynamic network security control and configuration
US11196636B2 (en) 2013-06-14 2021-12-07 Catbird Networks, Inc. Systems and methods for network data flow aggregation
US9912549B2 (en) 2013-06-14 2018-03-06 Catbird Networks, Inc. Systems and methods for network analysis and reporting
US10180972B1 (en) 2015-10-30 2019-01-15 Intuit Inc. Intelligent batching of verification requests for profile stores
US10038694B1 (en) * 2016-03-30 2018-07-31 EMC IP Holding Company LLC System and method for security mode-based authorization for data management operations in a multi-tenant protection storage system
US10581893B2 (en) * 2016-12-06 2020-03-03 Brigham Young University (Byu) Modeling of attacks on cyber-physical systems
US10404751B2 (en) * 2017-02-15 2019-09-03 Intuit, Inc. Method for automated SIEM custom correlation rule generation through interactive network visualization
US10205736B2 (en) 2017-02-27 2019-02-12 Catbird Networks, Inc. Behavioral baselining of network systems
US11329988B2 (en) * 2017-06-28 2022-05-10 Telefonaktiebolaget Lm Ericsson (Publ) Access to a service in a network
US20190102841A1 (en) * 2017-10-04 2019-04-04 Servicenow, Inc. Mapping engine configurations with task managed workflows and grid user interfaces
US10977209B2 (en) * 2017-10-23 2021-04-13 Spectra Logic Corporation Bread crumb directory with data migration
US11099818B2 (en) * 2018-12-11 2021-08-24 Jpmorgan Chase Bank, N.A. Application programming interface (API) creator and deployment tool
RU2724796C1 (ru) * 2019-02-07 2020-06-25 Акционерное общество "Лаборатория Касперского" Система и способ защиты автоматизированных систем при помощи шлюза
RU2746105C2 (ru) 2019-02-07 2021-04-07 Акционерное общество "Лаборатория Касперского" Система и способ конфигурирования шлюза для защиты автоматизированных систем
US11363041B2 (en) * 2020-05-15 2022-06-14 International Business Machines Corporation Protecting computer assets from malicious attacks
US20220159029A1 (en) * 2020-11-13 2022-05-19 Cyberark Software Ltd. Detection of security risks based on secretless connection data
US20230069738A1 (en) * 2021-08-23 2023-03-02 Fortinet, Inc Systems and Methods for Automated Risk-Based Network Security Focus

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040075675A1 (en) * 2002-10-17 2004-04-22 Tommi Raivisto Apparatus and method for accessing services via a mobile terminal
US20040243707A1 (en) * 2001-10-01 2004-12-02 Gavin Watkinson Computer firewall system and method
US20050125389A1 (en) * 2003-12-09 2005-06-09 Electronic Data Systems Corporation Providing access to a service using a service engine
US20110277034A1 (en) * 2010-05-06 2011-11-10 Tenable Network Security, Inc. System and method for three-dimensional visualization of vulnerability and asset data
US20140213371A1 (en) * 2011-08-04 2014-07-31 Playware Studios Asia Pte Ltd Method and System for Hosting Transient Virtual Worlds that can be Created, Hosted and Terminated Remotely and Automatically

Family Cites Families (93)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5657470A (en) 1994-11-09 1997-08-12 Ybm Technologies, Inc. Personal computer hard disk protection system
US6292833B1 (en) 1998-07-17 2001-09-18 Openwave Systems Inc. Method and apparatus for providing access control to local services of mobile devices
US6278694B1 (en) 1999-04-16 2001-08-21 Concord Communications Inc. Collecting and reporting monitoring data from remote network probes
US7757271B2 (en) * 2000-04-19 2010-07-13 Hewlett-Packard Development Company, L.P. Computer system security service
AU2003228541A1 (en) 2002-04-15 2003-11-03 Core Sdi, Incorporated Secure auditing of information systems
US20040078105A1 (en) * 2002-09-03 2004-04-22 Charles Moon System and method for workflow process management
US6952779B1 (en) * 2002-10-01 2005-10-04 Gideon Cohen System and method for risk detection and analysis in a computer network
US7624375B2 (en) * 2003-06-12 2009-11-24 National Instruments Corporation Automatically configuring a graphical user interface element to bind to a graphical program
US7827602B2 (en) 2003-06-30 2010-11-02 At&T Intellectual Property I, L.P. Network firewall host application identification and authentication
US7346922B2 (en) 2003-07-25 2008-03-18 Netclarity, Inc. Proactive network security system to protect against hackers
US7519996B2 (en) 2003-08-25 2009-04-14 Hewlett-Packard Development Company, L.P. Security intrusion mitigation system and method
US7194769B2 (en) 2003-12-11 2007-03-20 Massachusetts Institute Of Technology Network security planning architecture
US7281114B2 (en) 2003-12-26 2007-10-09 Tdk Corporation Memory controller, flash memory system, and method of controlling operation for data exchange between host system and flash memory
US8166554B2 (en) * 2004-02-26 2012-04-24 Vmware, Inc. Secure enterprise network
US7499994B2 (en) 2004-03-30 2009-03-03 Emc Corporation System and method of providing performance information for a communications network
US7877599B2 (en) 2004-05-28 2011-01-25 Nokia Inc. System, method and computer program product for updating the states of a firewall
US20060021034A1 (en) * 2004-07-22 2006-01-26 Cook Chad L Techniques for modeling changes in network security
US7529195B2 (en) * 2004-07-30 2009-05-05 Fortiusone, Inc. System and method of mapping and analyzing vulnerabilities in networks
US20060041936A1 (en) * 2004-08-19 2006-02-23 International Business Machines Corporation Method and apparatus for graphical presentation of firewall security policy
US7668925B1 (en) 2005-01-28 2010-02-23 Pmc-Sierra, Inc. Method and apparatus for routing in SAS using logical zones
US8116226B1 (en) 2005-01-28 2012-02-14 PMC-Sierra, USA Inc. Method and apparatus for broadcast primitive filtering in SAS
US7593013B2 (en) 2005-03-11 2009-09-22 University Of Utah Research Foundation Systems and methods for displaying and querying heterogeneous sets of data
US8117340B2 (en) 2005-04-25 2012-02-14 Microsoft Corporation Trans-network roaming and resolution with web services for devices
US20070006315A1 (en) 2005-07-01 2007-01-04 Firas Bushnaq Network asset security risk surface assessment apparatus and method
US9787556B2 (en) 2005-08-19 2017-10-10 Cpacket Networks Inc. Apparatus, system, and method for enhanced monitoring, searching, and visualization of network data
US20070079307A1 (en) 2005-09-30 2007-04-05 Puneet Dhawan Virtual machine based network carriers
US7930752B2 (en) 2005-11-18 2011-04-19 Nexthink S.A. Method for the detection and visualization of anomalous behaviors in a computer network
US20070143827A1 (en) 2005-12-21 2007-06-21 Fiberlink Methods and systems for intelligently controlling access to computing resources
US7801128B2 (en) 2006-03-31 2010-09-21 Amazon Technologies, Inc. Managing communications between computing nodes
US8307444B1 (en) 2006-06-12 2012-11-06 Redseal Networks, Inc. Methods and apparatus for determining network risk based upon incomplete network configuration data
US7886351B2 (en) 2006-06-19 2011-02-08 Microsoft Corporation Network aware firewall
US9003292B2 (en) 2006-07-06 2015-04-07 LiveAction, Inc. System and method for network topology and flow visualization
US8214889B2 (en) 2006-11-03 2012-07-03 Microsoft Corporation Selective auto-revocation of firewall security settings
US7849497B1 (en) * 2006-12-14 2010-12-07 Athena Security, Inc. Method and system for analyzing the security of a network
US8020207B2 (en) 2007-01-23 2011-09-13 Alcatel Lucent Containment mechanism for potentially contaminated end systems
US7711979B2 (en) 2007-02-16 2010-05-04 Symantec Corporation Method and apparatus for flexible access to storage facilities
US7792990B2 (en) 2007-04-30 2010-09-07 Hewlett-Packard Development Company, L.P. Remote client remediation
EP2163063A2 (fr) * 2007-05-24 2010-03-17 Iviz Techno Solutions Pvt. Ltd Procédé et système pour simuler une attaque de pirate sur un réseau
US8209738B2 (en) * 2007-05-31 2012-06-26 The Board Of Trustees Of The University Of Illinois Analysis of distributed policy rule-sets for compliance with global policy
US20090199298A1 (en) * 2007-06-26 2009-08-06 Miliefsky Gary S Enterprise security management for network equipment
US9118706B2 (en) * 2007-06-29 2015-08-25 Verizon Patent And Licensing Inc. Using imported data from security tools
US8099787B2 (en) * 2007-08-15 2012-01-17 Bank Of America Corporation Knowledge-based and collaborative system for security assessment of web applications
US8667556B2 (en) * 2008-05-19 2014-03-04 Cisco Technology, Inc. Method and apparatus for building and managing policies
US8713627B2 (en) 2008-08-14 2014-04-29 Juniper Networks, Inc. Scalable security services for multicast in a router having integrated zone-based firewall
US20100058456A1 (en) * 2008-08-27 2010-03-04 Sushil Jajodia IDS Sensor Placement Using Attack Graphs
US8612372B2 (en) 2008-08-29 2013-12-17 International Business Machines Corporation Detection rule-generating facility
CN101854340B (zh) 2009-04-03 2015-04-01 瞻博网络公司 基于访问控制信息进行的基于行为的通信剖析
US8205035B2 (en) 2009-06-22 2012-06-19 Citrix Systems, Inc. Systems and methods for integration between application firewall and caching
US9621516B2 (en) * 2009-06-24 2017-04-11 Vmware, Inc. Firewall configured with dynamic membership sets representing machine attributes
US8131992B2 (en) 2009-07-01 2012-03-06 Infoblox Inc. Methods and apparatus for identifying the impact of changes in computer networks
US9201077B2 (en) * 2009-07-27 2015-12-01 Colorado State University Research Foundation Direct enzyme immunoassay for measurement of serum progesterone levels
EP2299363B1 (fr) 2009-09-21 2013-01-09 STMicroelectronics (Rousset) SAS Procédé de nivellement de l'usure dans une mémoire non volatile
US8407800B2 (en) * 2009-11-24 2013-03-26 Honeywell International Inc. Method for software vulnerability flow analysis, generation of vulnerability-covering code, and multi-generation of functionally-equivalent code
EP2357575A1 (fr) * 2010-02-12 2011-08-17 Research In Motion Limited Navigation prédictive et à base d'image
US9268945B2 (en) * 2010-03-19 2016-02-23 Contrast Security, Llc Detection of vulnerabilities in computer systems
US8832835B1 (en) 2010-10-28 2014-09-09 Symantec Corporation Detecting and remediating malware dropped by files
US8683560B1 (en) 2010-12-29 2014-03-25 Amazon Technologies, Inc. Techniques for credential generation
CA2835210C (fr) 2011-05-12 2019-11-12 Airpatrol Corporation Gestion d'interaction de reseau pour des dispositifs
US8516241B2 (en) * 2011-07-12 2013-08-20 Cisco Technology, Inc. Zone-based firewall policy model for a virtualized data center
EP2737404A4 (fr) 2011-07-26 2015-04-29 Light Cyber Ltd Procédé de détection d'actions anormales dans un réseau informatique
US8839349B2 (en) 2011-10-18 2014-09-16 Mcafee, Inc. Integrating security policy and event management
US9009319B2 (en) 2012-01-18 2015-04-14 Rackspace Us, Inc. Optimizing allocation of on-demand resources using performance
US9058198B2 (en) 2012-02-29 2015-06-16 Red Hat Inc. System resource sharing in a multi-tenant platform-as-a-service environment in a cloud computing system
US8955036B2 (en) 2012-04-11 2015-02-10 Mcafee, Inc. System asset repository management
US9189395B2 (en) 2012-04-27 2015-11-17 Seagate Technology Llc Method and apparatus for adjustable virtual addressing for data storage
US8949931B2 (en) 2012-05-02 2015-02-03 Cisco Technology, Inc. System and method for monitoring application security in a network environment
US9049105B1 (en) 2012-05-11 2015-06-02 Amazon Technologies, Inc. Systems and methods for tracking and managing event records associated with network incidents
US9203847B2 (en) * 2012-06-26 2015-12-01 At&T Intellectual Property I, L.P. Detection and management of unauthorized use of cloud computing services
US9503475B2 (en) 2012-08-14 2016-11-22 Ca, Inc. Self-adaptive and proactive virtual machine images adjustment to environmental security risks in a cloud environment
US8959513B1 (en) 2012-09-27 2015-02-17 Juniper Networks, Inc. Controlling virtualization resource utilization based on network state
US9154507B2 (en) * 2012-10-15 2015-10-06 International Business Machines Corporation Automated role and entitlements mining using network observations
WO2014066500A1 (fr) * 2012-10-23 2014-05-01 Hassell Suzanne P Évaluation de modélisation analytique virtuelle destinée à un système de simulation d'opérations (cameo)
US9712551B2 (en) * 2012-11-30 2017-07-18 The Boeing Company Methods and systems for architecture-centric threat modeling, analysis and visualization
US9171169B2 (en) * 2012-12-14 2015-10-27 Salesforce.Com, Inc. System and method for dynamic analysis wrapper objects for application dataflow
EP2753069A1 (fr) 2013-01-08 2014-07-09 PIXarithmic GmbH Procédé de traitement vidéo en temps réel dynamique et appareil pour exécuter le procédé
US8893283B2 (en) 2013-01-31 2014-11-18 Hewlett-Packard Development Company, L.P. Performing an automated compliance audit by vulnerabilities
US9804890B1 (en) 2013-02-15 2017-10-31 Amazon Technologies, Inc. Termination policies for scaling compute resources
US9195484B1 (en) 2013-03-12 2015-11-24 Amazon Technologies, Inc. Dynamic logical zone assignment
US9507540B1 (en) 2013-03-14 2016-11-29 Amazon Technologies, Inc. Secure virtual machine memory allocation management via memory usage trust groups
US10075470B2 (en) * 2013-04-19 2018-09-11 Nicira, Inc. Framework for coordination between endpoint security and network security services
US20140351415A1 (en) 2013-05-24 2014-11-27 PacketSled Inc. Selective packet capture
US9088541B2 (en) 2013-05-31 2015-07-21 Catbird Networks, Inc. Systems and methods for dynamic network security control and configuration
US9769174B2 (en) * 2013-06-14 2017-09-19 Catbird Networks, Inc. Systems and methods for creating and modifying access control lists
US11196636B2 (en) 2013-06-14 2021-12-07 Catbird Networks, Inc. Systems and methods for network data flow aggregation
US9912549B2 (en) 2013-06-14 2018-03-06 Catbird Networks, Inc. Systems and methods for network analysis and reporting
US9485279B2 (en) 2013-11-04 2016-11-01 Illumio, Inc. Automated generation of access control rules for use in a distributed network management system that uses a label-based policy model
WO2015066208A1 (fr) 2013-11-04 2015-05-07 Illumio, Inc. Appariement dans un système de gestion de réseau distribué utilisant un modèle logique de politique multi-dimensionnel basé sur étiquettes
US9674042B2 (en) 2013-11-25 2017-06-06 Amazon Technologies, Inc. Centralized resource usage visualization service for large-scale network topologies
US20150304343A1 (en) 2014-04-18 2015-10-22 Intuit Inc. Method and system for providing self-monitoring, self-reporting, and self-repairing virtual assets in a cloud computing environment
US9591027B2 (en) 2015-02-17 2017-03-07 Qualys, Inc. Advanced asset tracking and correlation
US9509574B2 (en) 2015-04-03 2016-11-29 Illumio, Inc. End-to-end policy enforcement in the presence of a traffic midpoint device
US10284520B2 (en) 2017-02-02 2019-05-07 Cisco Technology, Inc. Mitigation against domain name system (DNS) amplification attack
US10205736B2 (en) 2017-02-27 2019-02-12 Catbird Networks, Inc. Behavioral baselining of network systems

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040243707A1 (en) * 2001-10-01 2004-12-02 Gavin Watkinson Computer firewall system and method
US20040075675A1 (en) * 2002-10-17 2004-04-22 Tommi Raivisto Apparatus and method for accessing services via a mobile terminal
US20050125389A1 (en) * 2003-12-09 2005-06-09 Electronic Data Systems Corporation Providing access to a service using a service engine
US20110277034A1 (en) * 2010-05-06 2011-11-10 Tenable Network Security, Inc. System and method for three-dimensional visualization of vulnerability and asset data
US20140213371A1 (en) * 2011-08-04 2014-07-31 Playware Studios Asia Pte Ltd Method and System for Hosting Transient Virtual Worlds that can be Created, Hosted and Terminated Remotely and Automatically

Also Published As

Publication number Publication date
WO2016036752A2 (fr) 2016-03-10
RU2679179C1 (ru) 2019-02-06
EP3238407A4 (fr) 2018-08-15
US10728251B2 (en) 2020-07-28
EP3238407A2 (fr) 2017-11-01
US20180069865A1 (en) 2018-03-08

Similar Documents

Publication Publication Date Title
WO2016036752A3 (fr) Systèmes et procédés permettant de créer et de modifier des listes de contrôle d'accès
WO2018026900A8 (fr) Systèmes et procédés de gestion, de suivi et d'offre d'emploi
EP4354318A3 (fr) Système de gestion de données personnalisables
MX2017012016A (es) Comunicaciones de usuario con un comerciante a traves de un sistema de red social.
WO2015123444A3 (fr) Services génomiques au consommateur intégrés
EP3148112A4 (fr) Procédé de traitement d'informations, noeud de réseau, procédé et serveur d'authentification
SG10201803024SA (en) System and method for token domain control
WO2014131021A3 (fr) Procédés permettant de découvrir des relations dans des réseaux de l'internet des objets (iot), de configurer ces relations et de les utiliser
MX2018012802A (es) Plataforma de comunicación inteligente contextual control multinivel, acceso variable, multiusuario.
WO2013176855A3 (fr) Système d'actions vocales personnalisées
WO2014031794A3 (fr) Articles pouvant être personnalisés électroniquement
WO2012161435A3 (fr) Procédé de gestion d'informations sociales et système adapté à ce procédé
WO2014014936A3 (fr) Détermination de scores d'influence
EP3547558A4 (fr) Procédé de rétroaction d'informations, équipement utilisateur et équipement de réseau
WO2015170182A3 (fr) Interface utilisateur et système de révision de publication
EP4236422A3 (fr) Les dispositifs et méthodes permettant de découvrir des données collectées et des données analytiques dans un réseau
WO2016003541A3 (fr) Systèmes informatiques dynamiques et utilisations de ceux-ci
WO2015160384A8 (fr) Incitation au partage de contenu par des utilisateurs
WO2014014853A3 (fr) Mise au point dynamique pour des environnements de visualisation de conversation
EP3608798A4 (fr) Procédé de recherche de groupe basé sur un réseau social, dispositif, serveur et support de stockage
EP3613010A4 (fr) Effets audio basés sur des données de réseautage social
EP3267388A4 (fr) Système de commerce, serveur de gestion et programme
WO2014197770A3 (fr) Partage informatisé de localisation de ressources numériques entre des organismes
EP3217351A4 (fr) Système de gestion de biens comportant une structure de bénéfice de type à convergence en reliant des biens immobiliers et des biens mobiliers
WO2013167052A3 (fr) Procédé et système de gestion d'informations internet, et serveur

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15838627

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2015838627

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2017127710

Country of ref document: RU

Kind code of ref document: A